1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
s344n2d4d5 [400]
3 years ago
5

Technical term of stealing personal information in social media.​

Computers and Technology
1 answer:
iVinArrow [24]3 years ago
7 0

Answer:

stalking/identity fraud

You might be interested in
Using the XML Document below (library with books), define the following queries in XQuery: (a) Give the titles of all Books sort
Softa [21]

Answer:

Explanation:

a)use order by clause for sorting

for $x in doc("books.xml")/bib/book order by xs:float($x/price) return $x/title (default sorted in ascending order)

or

for $x in doc("books.xml")/bib/book order by xs:float($b/price) descending  return $b/title (sorted in descending order)

b)doc("books.xml")//book[author = 'Abiteboul']

c)for $x in distinct-values(doc("bib.xml")/bib/book/author)

return <res>

<name>{$x}</name>

<count>

 {count (doc("bib.xml")//book[exists(indexof(author,$x))]) }

</count>

<res>

3 0
3 years ago
Programs that do the same thing every time they run are called...
Misha Larkins [42]

Answer:

predictable

Explanation:

because it repeat itself all time

6 0
3 years ago
Please help This is a homework in ICT class
Pavlova-9 [17]

Answer:

ejwksjnsskawii28393939393030jedjdjjccjncncnccnnccn

Explanation:

jsskaaaahujpjbhdueiwiwopwpwpwwieuehbfcnnccjxkxooss8ahwhwwnekdodod8djhdmslwoaishwhwkqoq18829293i4644673819191jednsmzljesksowlwlwpwpwnwkpwwwww waaaaayushsjsnmssoss ss sosijw

8 0
3 years ago
Hymter. Wants to workin The Energy career field with electrical energy
m_a_m_a [10]

Answer: what is the question

Explanation:

3 0
3 years ago
Which of the following is not true of hardware VPNs?A) should be the first choice for fast-growing networks.B) can handle more t
vfiekz [6]

Answer:

C) have more security vulnerabilities than software

Explanation:

Hardware VPN is a computer term that described a separate tool that serves the functions of a virtual private network. It has its own component and an internal processing unit.

However, some of the characteristics of Hardware VPN is the following:

1. It is expensive compared to software VPN

2. It is generally faster

3. It requires more than a beginner to handle

4. With an in-built firewall, it is generally more secure compared to a software VPN.

Hence, in this case, the correct answer is option C.

3 0
4 years ago
Other questions:
  • True or false An electronic form uses input fields in which the user can enter data from their own computer and then transmit t
    10·1 answer
  • With ____ editing, Word automatically displays a Paste Options button near the pasted or moved text.
    14·1 answer
  • The control programs managing computer hardware and software perform the _________ function to control and prioritize tasks perf
    8·1 answer
  • The steps for creating a newsletter are to ____.
    10·1 answer
  • Write a recursive method in pseudo code that returns the number of 1's in the binary representation of n. use the fact that this
    6·1 answer
  • Nathan took a picture of his friends while they were on a field trip. He wants upload this picture to a photo-sharing site. He w
    7·1 answer
  • A ________ is a very large general-purpose computer that is capable of performing very many functions as if these are done simul
    8·1 answer
  • Urgent ..algorithm and flowchart to check weather a number is odd or even ???​
    8·2 answers
  • Suppose that a is declared as an int a[99]. Give the contents of the array after the following two statements are executed: for
    15·1 answer
  • How many mb are in a gb?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!